10 Facebook tricks for Android

Facebook for Android is the official Facebook application for Android devices. At the time of writing this article, the application is at version 3.2.1 (available on the Google Play Store) and is an excellent integration of Facebook for mobile phones and tablets that use this operating system.

After seeing the 10 tricks for iPhone iPod Touch and iPad or the tricks for iOS devices, we now see 10 useful tips collected by Mashable for Android users.

Some of you may already know some of them but I assure you that most Android users do not know all the potential that this application offers. Browse the tricks and comment on the article by writing the ones you didn’t know. 😉

  1. Change the order of the news
    By default Facebook leads us to receive the “main news”, organized according to an algorithm called Facebook Edgerank . From a hidden setting, however, you can organize the news and receive it in chronological order. The display will always be managed by the algorithm but at least the news will be displayed from the most recent to the least recent.

Open the Facebook application on your Android phone or tablet and click on the three-line icon in the upper left. Then click on the gear wheel icon and choose the view for more recent news.

Change news order

  1. Install the Facebook widget
    On Android, in addition to applications, you can place widgets on the screen and few know that Facebook also has one. Hold your finger on the screen and browse through the widgets to add the Facebook one.

You can write a status update, add a photo or make a registration to a place directly from the home screen without having to open the application.

Facebook android widget

  1. Edit your favorites
    Favorites are a great way to organize pages, groups, applications, friend lists and interests on the left column on both the Facebook app and the facebook.com homepage.

From the application click on the three lines at the top left; scroll down and choose “Edit favorites” to select or deselect links to applications, pages etc. at the top.

Edit favorites
Click on the stars to remove them or add them at the top.

Favorites facebook android

  1. See the last time friends logged into chat
    Both from a computer and from the Facebook application it is possible to see the last time friends were online chatting on Facebook.

Click on the icon at the top right of the application to see next to each friend the mobile phone icon with the time since the last connection on Facebook.

Last connection time
Are you wondering how to hide this value from friends ? Just log out of the chat when you finish chatting. Press the icon at the top right (the three horizontal lines) and scroll down to click on “Account”.

Choose “Application settings” and remove the flag under “Chat availability” to disconnect and not allow others to see how long you have not connected on Facebook.

Android facebook chat availability

  1. Turn off notifications
    One of the things that annoys Facebook most for Android are the push notifications sent by the application every time something happens on Facebook (a like, a comment, a share, or even an invitation to an event etc. etc.) .

To disable them I have already written a guide, read how to disable Facebook notifications on Android .

The process is simple; from the menu at the top left scroll down to the Account item. Click and open the application settings. Then disable all notifications by removing the check under “Notifications” or choose one by one the types of notifications to be received.

Notification settings

  1. Share on Facebook from any application
    On Android you can share photos, links or videos from any application. Just click on the share button to see a screen like the one in the image, which allows you to share the content on other applications.

Share Facebook Android

  1. Access application settings from any page
    To access the Facebook app settings, you don’t necessarily need to go to the account -> Application settings from the top left menu.

Just press the options button on any Android device. On Samsung Galaxy is the button on the bottom left of the screen; pressed inside the app it will show a menu that allows you to access the settings, from any page, profile or part of Facebook.

Facebook Android settings

  1. Promote posts
    For administrators of pages that use Facebook advertisements, it is useful to know that it is possible to promote posts directly from the Facebook application, without having to use the computer.

Below each post on your pages you will find the link to highlight the post and sponsor it to fans and friends of fans.

Sponsored news

  1. Speed ​​up Facebook on your mobile phone or tablet
    After some time the Facebook application could become slow, browsing pages, photos and profiles could be unnerving, this due to the data cached by the application.

To speed up the application it is possible to empty the cache. Access the device settings on the Other -> Application Management tab and from the Facebook application page press the “Clear cache” button (the “delete data” button instead deletes all your information from the application “).

Clear application cache
If the application does not close due to some error / problem, a “forced shutdown” can be performed from the same screen.

  1. Don’t you like the official app? Try this

Android-fast-widget
The Facebook app despite the advice in point 9 is always too slow for your taste. I invite you to try this: Fast for Facebook . It makes Facebook fast, unobtrusive and is an application downloaded by millions of people in a short time.

How do banking Trojans bypass two-factor authentication?

SMS two-factor authentication is widely used by banking institutions. Obviously, this measure works better than a simple password, but it is not impenetrable. Security experts discovered 10 years ago how it can be circumvented when this security measure was gaining popularity recently.

The same goes for malware creators. That’s why bank Trojan developers easily violate single-use SMS passwords. Here’s how it works:

  1. a user opens an official banking app on his smartphone;
  2. a trojan detects which app is used and superimposes a fake copy on its interface (the fraudulent screen is the same as the real one);
  3. the victim enters the login credentials in the fake app;
  4. then the offenders request a financial transaction to their account;
  5. the trojan sends the user’s credentials to the criminals, who use them to log into the user’s real banking app;

What is two-factor authentication and where should you enable it? http://t.co/WSvDc9oSvb #passwords #privacy #security

  • Kaspersky Lab (@kaspersky) June 9, 2014
  1. the victim’s phone receives an SMS with the disposable password;
  2. the trojan extracts the password from the SMS and sends it to the cybercriminals;
  3. he also hides the SMS from the user, because the victim is not aware of the ongoing operations until he checks his current account and transactions;
  4. The criminals use the intercepted password to confirm the transaction and receive the victim’s money.

It is no exaggeration to say that every modern banking Trojan knows how to circumvent two-factor authentication systems with SMS. In fact, malware creators have no other choice: since all banks resort to this security measure, Trojans have to be adapted.

Evolution of #Asacub trojan: from small fish to ultimate weapon – https://t.co/lLv0pY4lol #infosec #mobile #banking pic.twitter.com/gAM3zzy7aC

  • Kaspersky Lab (@kaspersky) January 20, 2016

There are many illegal apps that can do this, more than you could imagine. In the past two months alone, our experts have published three detailed reports dedicated to three different families of malware. Each one more fearful than the other!

Asacub : an espionage app that has evolved into a trojan and has learned to steal money from mobile banks.
Acecard : a very powerful trojan capable of overlapping the interfaces of almost 30 different banking apps . By the way, mobile malware is now dominating this trend: in the beginning, Trojans targeted an app from a certain bank or payment service, but now they manage to fake many apps at the same time.
Banloader : a cross-platform Trojan of Brazilian origin, capable of entering PCs and mobile devices simultaneously.

Android trump card: Acecard https://t.co/yHxyACMslU #banking pic.twitter.com/DmnUAOJvSM

  • Kaspersky Lab (@kaspersky) February 22, 2016

As you can see, two-factor authentication is unable to protect you from banking Trojans. It has not been successful for many years, and now the situation is not improving. That’s why you need additional security measures.

The basic rule, useful but not 100%, is to install apps only from official stores. The point is that there have been enough cases where Trojans have succeeded with the Play Store or even the App Store .

That’s why the most reliable solution is to install a good antivirus on your mobile phone. You can start with the basic version of Kaspersky Internet Security . It’s free, although from time to time you have to scan the devices manually. The full version is better, because it catches viruses on the fly, but it’s payment.

Online security: 6 simple rules suitable for all ages

Do you have an asphyxiating mother or a father who wants to know continuously what you are doing, both in normal life and on Interner? C’est la vie! If you want more freedom, behave like

Do you have an asphyxiating mother or a father who wants to know continuously what you are doing, both in normal life and on Interner? C’est la vie! If you want more freedom, act like adults and show your parents that you are cautious.

You yourself will see the results. Protecting your social network accounts or those of your online games is very important. As we have told you several times on these pages, cyber criminals can enter your Facebook account, infect your smartphone with a virus or steal your video game accounts.

6 simple safety rules suitable for all ages

These criminals don’t care who they steal, it could be you or your grandfather, but if you have an account to play online, they are more likely to attack you than your grandfather. That’s why it’s important that you know how to protect your computer from Trojans and viruses. Some viruses are created to spy on you and get your hands on your passwords or other valuable data.

Are you taking these 4 steps to avoid catching a virus on the Internet? https://t.co/FEiz5rRC6h #internetsecurity pic.twitter.com/TJzODvHAo2

  • Kaspersky Lab (@kaspersky) July 8, 2015

As for passwords, most users use weak passwords. People very often choose unsafe combinations like ‘12345’ or ‘qwerty’; they save them on .doc files or on the hard disk and share them with friends via chat. Is it necessary to remind you that this kind of slightly habits, these naive behaviors, are not advisable ?

password safety tips to keep your kids safe on the Internet #safekids https://t.co/NREPuz57Id pic.twitter.com/0eWu3gvYtF

  • Kaspersky Lab (@kaspersky) July 13, 2015

On the street tell strangers where you go and what you do, what you eat for breakfast or reveal the addresses of your friends? Probably not. On the Internet you have to follow the same rules. If you do not configure the privacy settings of your social networks well, anyone can access this information by taking a look at your Facebook or Instagram profile. So, keep this information private !

Security do’s and don’ts: Keeping weirdos aside https://t.co/zLx7VTMqUE #parenting #safekids #internettips pic.twitter.com/foTFp4GsKZ

  • Kaspersky Lab (@kaspersky) July 20, 2015

Cybercriminals know how to make money by hacking your smartphone. In fact, they are very good. For example, they can steal your money by making you make calls to toll numbers or by subscribing to paid SMS services without you noticing. For this reason, your phone needs to be protected as well as your desktop computer.

It’s time to secure your #mobile devices #security https://t.co/SwiCRJe3P7 pic.twitter.com/5n7cy9B9Ei

  • Kaspersky Lab (@kaspersky) July 27, 2015

Cyberbullying is another widespread scourge on the Internet. People are cruel and teenagers can be terrible at times. On the Internet, you may get involved in endless battles that don’t bring any good. Don’t waste your time and effort with these people; focus your energies on things that really interest you. If you find yourself facing a problem and can’t handle it, take a look at these tips .

Tips on confronting a cyberbully #safekids #parenting https://t.co/fP6Xoy2CjZ pic.twitter.com/VngWzoVNBM

  • Kaspersky Lab (@kaspersky) August 3, 2015

Remember that people are often very lying. Don’t pay attention to those beautiful girls or those guys with fantastic profiles who seem to give the idea of ​​living a dream life: that’s probably not the way things are! We all have prejudices, make mistakes and sometimes lie. So be careful: on the Internet not everything is as it seems .

Not everything on the internet is what it appears – http://t.co/cLSoQKdHeU pic.twitter.com/LDB7pMzn1l

Now, after reading our complete guide on online security, you are ready to surf. We wish you a pleasant journey and a little rough sea! Finally, always remember to consult your parents if you have any doubts or are in a difficult situation … or leave us a comment below!

That’s why you should never use someone else’s Apple ID on your iPhone

Users of any Apple device must have an Apple ID, a sort of digital passport to explore and experience the Apple world. To enter, you need an Apple ID that gives you a variety of rights and, like a real passport, it must not be loaned to anyone or you must not borrow it.

The first point of view is quite intuitive: if you give someone else your Apple ID you would lose access to your devices, data, subscriptions to which you are subscribed etc. Doubt may arise when we advise you against entering someone else’s Apple ID on your iPhone or iPad. Let’s analyze Marcie’s story as a case study.

Selling a used iPhone
After a year of love with her phone, Marcie decides to sell her iPhone X. Marcie simply wants to switch to a newer model, an XS or at least an XR. He initially plans to sell it on eBay, adding an ad on Craigslist for safety.

The next step is about the price. The phone is in good condition, so it decides to aim for a good selling price. In a year he had practically gotten dust, and there was not even a scratch! It will certainly take some time to find a buyer, but Marcie is in no hurry.

To his surprise, someone came forward the next day. A very nice woman writes to her that her husband would really like to buy an iPhone but he is always very busy and has no chance to make an appointment until the end of that week. However, he really appreciates the fact that the device is in perfect condition, for this he would like to pay the phone in advance and then pick it up later. To verify that the phone is fully functional, the woman asks Marcie to enter her husband’s Apple ID on the device. If everything seems okay, the lady would have immediately made the bank transfer to pay the price of the phone.

Marcie is thrilled, she thought it would take at least a couple of weeks to sell it, and instead 24 hours later, it’s all done. The lady sends her husband’s Apple ID email and password and Marcie wonders how some people reveal such important information to a perfect stranger without batting an eye. In any case, it is not his problem, so he enters the data on his smartphone and confirms to the lady that everything is ready to check the functioning of the iPhone.

At this point something happens that Marcie does not expect remotely. A message appears on the screen that the phone has been locked and someone at that certain email address will be contacted to unlock it. And there is no way to go beyond the black screen with this unpleasant message, the phone has been locked, period.

The “kind lady” (or a fake account) no longer responds to Marcie’s messages, who sends an e-mail to the famous address and is told that, in order to get the phone back, she should make a good payment in cryptocurrency.

Marcie stops for a moment to think and realizes that she has no guarantee that she won’t be fooled this time too. His iPhone is there on the table, a useless brick and totally indifferent to Marcie’s tribulations. And although she still has doubts as to whether or not to pay the ransom, she gets angry at herself for being fooled in this way.

Beware of strangers and their Apple IDs
The moment you allow someone to enter their Apple ID on your device, the device is no longer in your possession. And if cybercriminals take possession of it, it will not be easy at all to get him back: after deceiving the victim, the cybercriminals block the device through the iCloud functionality “Find my iPhone”.

This functionality was created to prevent a stranger from peeking at what the found device contains; in any case, the contacts will be displayed on the screen so whoever found the phone can contact the rightful owner.

In this case, of course, the device has not been lost; however, as soon as the victim enters another person’s Apple ID, the phone is immediately added to the list of devices associated with that person’s iCloud, and there is no going back from there. In short, a useful feature turns into something harmful if the purpose changes: cybercriminals use Find my iPhone to block iPhone and iPad and then request a ransom.

If you have to sell a used device, keep your eyes peeled and not just for the case just described. A widely used social engineering technique is to circumvent users of the forums that concern the Apple world, asking them to be able to enter their Apple ID using pretexts such as “my phone is dead, all my contacts are on iCloud, I have to call my boss urgently, please give me a hand “or something.

Thinking about it, if a similar situation were to happen and if you had Apple ID e-mail and password, wouldn’t it be enough just to connect to the web version of iCloud and put everything in place? But no. The cybercriminal account is protected by two-factor authentication so when you log in to iCloud, you must also enter the code sent to one of the devices. And of course, only cybercriminals have access to it, so being aware of Apple ID alone is not enough.

Moral of the story: never enter someone else’s Apple ID on your device. Even if they ask you please.

Android apps that spy on your devices

We have already talked about the mechanisms of advertising on the Internet and the tricks that use advertising networks to know the websites you visit . But your online life goes far beyond these sites. It is very likely that you spend a good part of your time on mobile apps and they also earn thanks to advertising; just like sites, apps also collaborate with ad networks.

To allow advertisers to get a detailed dossier about you in order to offer you personalized ads, the applications provide them with information on your device, even the information that Google prevents them from using.

What information can facilitate the tracking of your Android device?
What do applications to ad networks say about you? First of all, they are installed on your device. When the advertising network receives this information from various applications, it is able to find out your interests and therefore what are the types of ads that most attract you. For example, if you take a lot of selfies and you have Instagram and Snapchat installed on your phone, you could appreciate apps for filters and effects for photos.

Ad networks use device identification systems to accurately recognize the device on which apps are running. Every Android smartphone or tablet has various identifiers and most of them have not been created to help advertisers.

For example, unique IMEI codes help identify phones on the cellular network or to lock devices in the event of theft . A serial number can help you find all devices in the same batch that have defects, to withdraw them from the market. A MAC address, another unique identifier, allows connection to the network and in particular it can be useful to limit the list of devices authorized to connect to your home Wi-Fi network. Finally, mobile application developers use Android IDs (SSAID aliases) to manage the licenses of their products.

For a long time there was no type of advertising identifier, so applications used to share these identifiers with their partners. In this way users had no way to escape personalized ads: IMEI or MAC are unique codes that allow direct identification of any device. Whenever an ad network receives one, the network understands that the application has been installed on your phone.

In theory, these codes are modifiable (there are applications for this too) but it is not so easy and, even worse, it is an operation that can be risky for your phone. Root permissions are required for experiments of this type, and rooting makes the device vulnerable. Furthermore, manipulations such as the modification of the IMEI are illegal in some countries.

It is easier to change the Android ID: you just need to reset the phone or tablet to the factory settings. But once this is done, you will have to set everything up again, reinstall all your applications and log in to each one again. In short, it’s a nuisance, that’s why it’s not done so often.

Advertising ID: Theory
In 2013, Google presented an advertising ID to reach a compromise between Android users and the advertising industry. Google Play services assign the ID and users can restore it and create a new one if necessary, by going to Settings → Google → Ads → Reset advertising ID . On the one hand, the identifier allows ad networks to track the habits and hobbies of device users. On the other hand, if you don’t like the idea of ​​being spied on by advertisers, you can easily reset the ID at any time.

The Google Play store rules stipulate that advertisers may only use the advertising ID and nothing else for advertising purposes. The platform does not prohibit linking this ID to other identifiers, but Google Play applications need users’ consent.

The idea is that if personalized ads don’t bother you, you can leave the advertising ID as it is and you can also decide to authorize applications to connect it to any other system. On the contrary, however, you can prohibit the connection of this ID to other identifiers and reset the ID from time to time, thus disconnecting your device from the dossier previously collected. Unfortunately, the reality is another.

Advertising ID: reality
According to researcher Serge Egelman, over 70% of Google Play applications use at least one extra identifier without notifying it. Some of them, such as 3D Bowling , Clean Master and CamScanner, have been downloaded by millions of people.

Most of them use the Android ID, but IMEI, MAC addresses and serial numbers are also useful. Some applications send three or more identifiers to partner networks simultaneously. For example, the 3D Bowling game uses the advertising ID, the IMEI code and the IDAndroid.

Such practices make the idea of ​​advertising ID useless. Even if you try to prevent being spied on and continue to reset your advertising ID, the advertising network will use other more persistent identifiers to create another ID for your profile.

A malicious Android app has been downloaded over 100 million times from Google Play

Even if this behavior goes against the rules of Google Play, it is not easy to track down applications that take advantage of IDs. Google checks all applications before the release, but many not quite honest authors have found alternative methods and create malicious applications . Even the miner found ways to sneak in the store , so it’s no surprise that apps that seem to have no harmful characteristics sometimes go unnoticed.

Google cannot deny access to device identifiers to these applications, since they serve much more than just advertising. For example, by denying mobile apps access to the Android ID , Google would prevent app developers from protecting their products from piracy, thereby violating their rights.

Combat annoying ads
Of course, Google has introduced measures to limit the misuse of IDs. Thus, starting with Android Oreo, each application will have its own Android ID . Thus, for ad networks that rely on this ID instead of the ad ID, your Instagram will appear to be installed on one device and your Snapchat on another, thus making this data useless for accurate targeting.

However, IMEIs, serial numbers and MAC addresses cannot receive this type of protection, and the market is full of smartphones and tablets that use previous versions of Android and will never be updated to Android Oreo. We therefore recommend limiting data collection through application management.

Eliminate applications you no longer use. The fewer applications installed, the less data is collected by the ad networks;
Do not grant unnecessary permissions to the applications you wish to keep. This precaution will not completely prevent them from spying on you, but at least it will prevent applications from indiscriminately granting your IMEI code. In this case, I am accessing the IMEI code is set with a telephone authorization . Thanks to this same authorization, applications can know your phone number, see your calls, make calls (at your expense of course) and much more, so we advise you not to activate it.

How to best use the iPhone

4 simple tricks to take advantage of it for longer
Ever since it exists, the iPhone is, par excellence, the smartphone that ensures greater longevity. Apple has been providing updates for over 5 years since the release of the device – for example, the new iOS 14 operating system arriving next September will still support, in 2020, the iPhone 6S and 6S Plus , available to the public at the end of 2015.

But using an iPhone is not just about using it and then buying a new one after one or two years: Apple products are supported for many years and there are some simple but not trivial routines that help keep the iPhone in shape, even when the signs of obsolescence begin to be felt.

  1. Eliminate unnecessary apps

How to best use the iPhone: 4 simple tricks to take advantage of it for longer
It may seem like an obvious tip, but in the action of eliminating unnecessary, unused apps, there is much more complexity than you can imagine. To eliminate apps that are no longer used, it should be remembered that there may be apps that, from time to time, no longer make sense to populate the homescreen. So it is good to plana periodic review of their apps, perhaps creating a recurring appointment on the calendar, and taking time to delete the superfluous and leave room for what is otherwise important. With iOS 12, released in 2018, the process is even simpler: the system deletes unused apps and adds a speech bubble next to the writing under its icon, making it easier to identify. Or you can go to Settings -> General -> iPhone Space, wait a few seconds for it to load and scroll down to find the apps that, under the name, have the words Never used. Obviously this process is totally variable from person to person, or from context to context. During the pandemic, for example, it made little sense to keep travel apps on the iPhone, but it made much more sense to keep the messaging and video call apps. It may be helpful to repeat this procedure onceevery 3 months .

  1. Freeing up space from photos and videos
    Media files are often the main cause of running out of memory space. To get around this problem just move everything to the cloud, using iCloud Photo Library, included with iCloud subscription plans, or Google Photo, which is free if you agree to slightly compress your files. In both cases, you can then delete the photos that have been uploaded:

How to best use the iPhone: 4 simple tricks to take advantage of it for longer

  • With iCloud Photo Library, just go to Settings -> click on your name -> iCloud -> Photos -> Optimize iPhone space , and the system will free up space when needed, automatically deleting photos and videos already uploaded to the cloud ;

How to best use the iPhone: 4 simple tricks to take advantage of it for longer

  • With Google Photo, just enter the app, click on your profile in the upper right corner, then go to Photo Settings -> Manage storage space -> Free space . The app will delete all photos, but you will still need to make a further step in the Recently Deleted folder of the Photos app, to permanently delete them.
  1. Reduce location services

How to best use the iPhone: 4 simple tricks to take advantage of it for longer
Optimizing not only means making it go faster, but also consuming less battery. For statistical purposes and to improve some services, Apple basically activates some location services which, however, can dramatically decrease the battery life. Many of these services can be deactivated, keeping the functionalities useful for road navigation and Find My iPhone.

Just go to Settings -> Privacy -> Location Services , then scroll to the bottom of the page and go to System Services. You can disable, in the order in which they are presented: Apple Ad from location, Alerts from location, Compass calibration, Share my location, Time zone setting (which, when traveling, can be reactivated as needed), System customization, Networks and wireless, Cellular network search, Location suggestions, Relevant locations, iPhone analysis, Routes and traffic, Popular near me(the latter three can be deactivated if Apple Maps is not used). To understand if there are apps that use localization when we don’t want to, it is better to activate the Status bar icon, which will show a purple arrow in the status bar when an app is using localization. To reduce the GPS services of the apps too, just go back one screen, in Location Services , and check the apps one by one, clicking on each and preferring While using the app as a setting. A useful way to understand which apps really need GPS to work is to set Maias a location setting on each app and then open them one by one to understand if the app is unusable. Rarely does an app always need location services – except for road navigation apps and device tracking apps , such as RescueTime and Exist.io .

  1. Reorder the homescreen

How to best use the iPhone: 4 simple tricks to take advantage of it for longer
Rearranging the apps on the homescreen makes the iPhone a more valid and efficient tool: scrolling through the pages in search of the right app can lead to distraction on others and therefore to drain the battery and waste time. Having the right apps at your fingertips makes it easier and faster. After deleting all the superfluous apps, just select the 20 or 24 (depending on the type of iPhone) apps that you use or want to use more, and arrange them in the way you check them in the morning or evening. For example: if you use email a lot on your smartphone, the Mail app may be in the center of the screen, because it is easier to get there with your finger and is clearly seen when you unlock your smartphone. If in a particular period you want to do more meditation, maybe you move the related app to the front page.

This method also works in reverse. The apps that are used the least must be moved to the last pages: to avoid, for example, excessive use of Facebook, you can delete the app or move it to the queue. If you don’t see it, you are less likely to use it.

If you have a Huawei or Honor smartphone you need to know these tricks

special tricks EMUI Huawei HonorEMUI is the name of the Android personalization system assigned by Huawei and Honor to their phones. From the outside it looks like a normal custom graphic interface with exclusive features for accessing applications. But inside it hides some tricks that you better know. Let’s not waste any more time and find out now.

Cheats for EMUI on Huawei / Honor branded devices
We have converted into 6 categories of suggestions for what are the best tricks to be exploited to enhance the user experience with mobile devices in the category. Just to cite a few examples, you can use these tips for Honor View 20, P30, Mate 20 Pro and many other devices of the parent company.

Customization
Customizing the GUI is rewarding, as tastes change over time, adapting to personal needs. Use these tips.

Change the wallpaper: Settings> Home screen and wallpapers> Wallpaper> Set wallpaper> Gallery / Other.
Activate the app drawer: go to Settings> Home screen and wallpapers> Home screen style> Drawer .
Activate the always on display : Settings> Home screen and wallpapers> Always on display.
Choose how to navigate the system: Settings> Smart Assistance> System Navigation; here you can decide whether to activate the single navigation key to access the home screen, back and recent activities, whether to activate the virtual navigation bar (customizing the combination of keys) or opt for the quick menu.
Change the quick settings: lower the drop-down menu and click on the pencil icon.
Change layout and rearrange apps: hold down on the home screen and click on Settings , in this section you can rearrange your apps even by shaking your smartphone to realign them.
View the battery percentage: Settings> Apps and notifications> Notifications and status bar> Battery percentage : Do not show / Next battery icon / Inside battery icon .
Add contact info on the lock screen: Settings> Security and privacy> Lock screen> Sign lock screen.
Disable the pedometer from the lock screen: Settings> Security and privacy> Lock screen> Show pedometer in lock screen.

Display
The display is an essential component of the phones. We are not only talking about brightness but also about color rendering, font size and much more. All things on which we can intervene through the definition of these parameters.

Font Size: The ettings> Display> Text size .
Change the size of the interface elements: The ettings> Display> Display.
Screen Resolution: The ettings> Display> Screen Resolution.
Display Brightness : The ettings> Display> Brightness.
Color Temperature : The ettings> Displays> Color temperature> Default / Warm / Cold.
Color Mode: The ettings> Display> Color Mode> Normal / Vivid.
Filter screen blue light : The ettings> Display> Eye protection.
Hide the notch: Settings> Display> Other settings> Notch.
Turn off the display: The ettings> Display> Sleep> 30 seconds is a good middle ground to limit consumption.
Display app in full screen mode: The ettings> Display> Display full screen.
Rotate the screen: The ettings> Display> Auto / Smart Rotation.
Increase the touchscreen sensitivity during the winter: Settings> Smart assistance> Glove mode.
View photos on the lock screen while charging: Settings> Display> Screensaver .

Speed ​​up the system
An agile and quick system is everyone’s dream. Not all the options offered in coordination with the purchase are useful. Removing some of them will bring a lot of benefit.

Find files quickly: swipe down the home screen and you will see the search bar appear.
Activate voice commands: Settings> Intelligent Assistance> Voice command, to answer or reject calls by voice.
Calling a contact from the screen off: press and hold the volume down key and say the name of the contact after the beep.
Awaken Google Assistant: hold down on the home button and use the voice commands in Italian (remember to activate it first from the Google app).
Open the apps by drawing the initial on the display: Settings> Smart Assistance> Motion Control> Open Applications.
Split the screen in two with your knuckle: Settings> Smart Assistance> Motion Control> Split Screen.
Activate the quick launcher: from the unlock screen, swipe from the bottom to the top to access the recorder, flashlight, calculator, timer and camera.
Use two WhatsApp / Facebook accounts: Settings> Apps and notifications> Twin app .
Enable unlocking with face recognition: Settings> Security and privacy> Unlocking with a smile.
Activate one-handed use: Settings> Smart Assistance> One-Handed UI> Mini Screen View .
Take a screenshot: instead of the classic combination Low Volume + Power button , knock on the screen with your knuckle.

Safety
Inhibiting access to your device is essential to prevent data theft and stealthy reading of messages from Whatsapp and other apps. Do you want your secrets to remain so? Here are some tips to follow.

Set up one or more fingerprints: Settings> Security and privacy> Fingerprint ID .
Enable unlocking with face recognition : Settings> Security and privacy> Unlocking with a smile.
Create a private island on your smartphone by activating Private space: Settings> Security and privacy> Private space.
Encode photos, audio, videos and other files: Settings> Security and privacy> Files in safe> Activate.
Block access to some apps: Settings> Security and privacy> App lock.
Locate your device if it is lost or stolen: Settings> Security and privacy> Find my device> On.
Install unknown apps: Settings> Security and privacy> Other> Install unknown apps.
Set / Deactivate SIM PIN: Settings> Security and privacy> Other> Set SIM lock.

Camera
Using the phone camera as a professional solution is possible. The Kirin 970’s NPU system has enhanced shooting and shooting capabilities thanks to Artificial Intelligence and new software possibilities.

Activate Pro mode: open the camera app. swipe from left to right and click on Pro foto or Pro video .
Take a photo with the screen turned off: double click on the low volume.
Quickly browse photos in the Gallery: open a photo in the Gallery, pinch it to make the photo smaller and scroll through the other shots.
Select multiple photos at the same time: open the folder, press for a few seconds on the photo you want to select and slide your finger to select the others.
Create the bokeh effect: open the camera and click on the icon that simulates the aperture of the lens; now click on the object you want to focus on and click.
Adjust the beauty effect: click on the portrait icon and slide your finger on the beauty level indicator.
Having fun with AR: activate AR Lenses from the camera menu, click on AR and select the effects you want to see in real time on the framed object.
Artist mode: to transform your photos into comics or make them works of art (Prisma style).
Apply Instagram-style filters before shooting: activate the Filter item between camera modes and then click on the three circles to view the nine filters in real time.
Take a photo with a smile: access the camera settings with a side swipe and activate the Acquire smiles item .
Scan a document: open the camera and click on Scan document; frame the business card and proceed with the scan following the instructions.
Activate / Deactivate AI : depending on the device you can do this by accessing the camera app and clicking on Settings> Master AI or select the AI button from the screen that you will see when the camera is launched.
Apply the grid : launch the camera app, Settings> Camera grid> Grid .
Set the shutter-release timer : launch the camera app, Settings> Timer and select between 2/5 or 10 seconds.

Battery
Not even the largest battery can push a device beyond two days of intense use. We typically use quick charge, but there is more than one way to extend autonomy .

Activate power saving mode: to limit apps in the background, deactivate automatic synchronization of email and system audio.
Opt for the ultra energy saving mode: for emergency situations, this mode allows the use of very few apps, greatly limiting the user experience.
Understand what weighs on energy consumption: Settings> Battery> Battery use.
Optimize consumption: Settings> Battery> Optimize, click now on Optimize on the tips you want to put into practice.
View percentage of charge left : Settings> Battery> Battery percentage and click on Next to icon or In icon.
Set the black background on the interface to save battery : Settings> Battery> Dark colors interface.
Use reverse wireless charging: Settings> Battery> Reverse wireless charging.

Huawei is the strongest smartphone maker of 2020, surpassing Samsung

The challenge at the top between Samsung and Huawei for the title of main manufacturer in the smartphone sector has continued for some months. The Chinese producer in fact, in the last period has managed to overcome the Korean rival by winning the leadership.

The advantage of Huawei is mainly related to economic recovery in the Chinese market after the lockdown suffered by the region. However, as we have been able to see , the data show that Samsung is recovering the lost market shares , thus following the current leader.

Despite Samsung’s recovery, the data collected by Canalys confirms Huawei in first place . The Chinese giant maintains the first position for the second consecutive quarter underlining the good performances in the first half of 2020.

Huawei is confirmed as the leading smartphone manufacturer
The result therefore allows Huawei to be the world’s leading smartphone maker . The data take into account the devices shipped by the manufacturer despite the BAN imposed by the USA and the limitations that follow.

Between April and June 2020, the manufacturer shipped around 55.8 million devices . Two thirds of these devices are sold in China, the motherland of the brand, for a total market share of 46%. This value alone is greater than the market share of Vivo, OPPO and Xiaomi. The advantage over Samsung is also evident, as the Korean company stopped at 53.7 million .

Huawei’s success is absolutely out of the question, despite the 5% year-over-year drop in sales, revenues increased 13% over the same period last year. Samsung, on the other hand, recorded a 30% year-on-year decline , a factor that compromised leadership, at least during this period. At the moment it is not clear whether it is a definitive overtaking or just a combination of factors advantageous for the Chinese market.

error: Content is protected !!